๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News
26.1K subscribers
89.3K links
๐Ÿ—ž The finest daily news on cybersecurity and privacy.

๐Ÿ”” Daily releases.

๐Ÿ’ป Is your online life secure?

๐Ÿ“ฉ lalilolalo.dev@gmail.com
Download Telegram
๐Ÿ” Smart building security flaws leave schools, hospitals at risk ๐Ÿ”

Vendors of smart building hardware issued updates to products without disclosing that vulnerabilities were patched, leading security systems for schools and hospitals to be accessible via the web.

๐Ÿ“– Read

via "Security on TechRepublic".
๐Ÿ•ด Online Fraud: Now a Major Application Layer Security Problem ๐Ÿ•ด

The explosion of consumer-facing online services and applications is making it easier and cheaper for cybercriminals to host malicious content and launch attacks.

๐Ÿ“– Read

via "Dark Reading: ".
๐Ÿ•ด SEC Issues Charges in 'Edgar' Database Hack ๐Ÿ•ด

One defendant is still facing charges issued in 2015 for a $30 million hacking and securities fraud scheme.

๐Ÿ“– Read

via "Dark Reading: ".
โŒ Data Breach Roundup: U.S. Healthcare, Cryptopia, SingHealth and Experian โŒ

January is off to a running start on the data breach front, while Experian is predicting new attack frontiers ahead.

๐Ÿ“– Read

via "Threatpost | The first stop for security news".
๐Ÿ•ด Report: Bots Add Volume to Account Takeover Attacks ๐Ÿ•ด

Bots that can launch hundreds of attacks per second are making account takeover fraud more difficult to defend against.

๐Ÿ“– Read

via "Dark Reading: ".
โŒ IDenticard Zero-Days Allow Corporate Building Access, Location Recon โŒ

Multiple hardcoded passwords allow attackers to create badges to gain building entry, access video surveillance feeds, manipulate databases and more.

๐Ÿ“– Read

via "Threatpost | The first stop for security news".
<b>&#9000; โ€œStole $24 Million But Still Canโ€™t Keep a Friendโ€ &#9000;</b>

<code>Unsettling new claims have emerged about Nicholas Truglia, a 21-year-old Manhattan resident accused of hijacking cell phone accounts to steal tens of millions of dollars in cryptocurrencies from victims. The lurid details, made public in a civil lawsuit filed this week by one of his alleged victims, paints a chilling picture of a man addicted to thievery and all its trappings. The documents suggest that Truglia stole from his father and even a dead man โ€” all the while lamenting that his fabulous new wealth brought him nothing but misery.</code><code>Media</code><code>The unflattering profile was laid out in a series of documents tied to a lawsuit lodged by Michael Terpin, a cryptocurrency investor who co-founded the first angel investor group for bitcoin enthusiasts in 2013. Terpin alleges that crooks stole almost $24 million worth of cryptocurrency after fraudulently executing a โ€œSIM swapโ€ on his mobile phone account at AT&T in early 2018. Terpin also is pursuing a $200 million civil lawsuit against AT&T in connection with the theft.</code><code>Authorities arrested Truglia on November 14, 2018 on suspicion of using SIM swaps to steal approximately $1 million worth of cryptocurrencies from a different Silicon Valley executive. But Terpinโ€™s civil lawsuit (PDF) maintains that evidence was revealed at Trugliaโ€™s bail hearing that he had texted his father and multiple friends to brag about the $24 million hack on the day of Terpinโ€™s theft, allegedly offering to take friends to the Super Bowl with โ€œporn star escorts.โ€</code><code>Terpinโ€™s lawsuit includes a large number of supporting documents, including an affidavit filed by Chris David, a 25-year-old New York City resident who claims to have been an acquaintance of Trugliaโ€™s until he began to unravel the source of his new friendโ€™s overnight riches.</code><code>In his affidavit (PDF), David describes himself as a self-employed private jet broker who met Truglia in a fitness center attached to Trugliaโ€™s luxury apartment building. Truglia allegedly struck up a conversation about booking private jets with his cryptocurrency. When the two met again a few days later, David says Truglia showed him accounts on his mobile phone and computer indicating he had over $7 million in cash in a JP Morgan account and more than $12 million in various cryptocurrencies.</code><code>โ€œAt the same time, Nick showed me two thumb drives (Trezors),โ€ David recounted. โ€œOne had over $40 million in cash value of various cryptos, and the other one had over $20 million cash value of various cryptos.โ€</code><code>David said Truglia initially explained his wealth by saying heโ€™d made the money by mining cryptocurrencies, but that Truglia later would admit he stole the funds.</code><code>โ€œOver the next few months, Nick and I socialized at nightclubs, local bars, the gym, and in his apartment playing video games,โ€ David recounted. โ€œGradually, I got to know Nick. He does not have a job or visible means of support. His typical day is to get up late, go to the gym, eat at the deli across the street, play video games late into the night and he had no friends. Nick was an egotistical braggart about his life and wealth. For example, once at a crowded lounge, he said: โ€˜Chris, I have more money than all of the people here tonight.'โ€</code><code>David started documenting Trugliaโ€™s activities after he and several of his friends were arrested for allegedly stealing Trugliaโ€™s laptop, mobile phone and Trezor drive. That incident, recounted in this New York Post story  and in Davidโ€™s own testimony, indicates that Truglia later recanted the accusation and chalked it up to confusion resulting from a heavy night of drinking.</code><code>According to David, when Truglia wasnโ€™t bragging about his wealth he was displaying it openly: He lived in a $6,000 per month apartment, wore a Rolex watch which he claimed cost $100,000, and boasted he was going to purchaseโ€ฆ
๐Ÿ•ด Hijacking a PLC Using its Own Network Features ๐Ÿ•ด

Researcher to show how attackers can exploit the built-in advanced connectivity functions in some Rockwell PLCs.

๐Ÿ“– Read

via "Dark Reading: ".
ATENTIONโ€ผ New - CVE-2016-10738

Zenbership v107 has CSRF via admin/cp-functions/event-add.php.

๐Ÿ“– Read

via "National Vulnerability Database".
ATENTIONโ€ผ New - CVE-2016-10737

Serendipity 2.0.4 has XSS via the serendipity_admin.php serendipity[body] parameter.

๐Ÿ“– Read

via "National Vulnerability Database".
โš  Police canโ€™t compel biometric phone unlocking, rules judge โš 

The landmark decision asserts the same legal protection for biometrics that we're given for passcodes.

๐Ÿ“– Read

via "Naked Security".
โš  Beware buying Fortniteโ€™s V-Bucks, you could be funding organised crime โš 

Credit card thieves are laundering money by purchasing the in-game currency V-Bucks, then selling it back at a discount to players.

๐Ÿ“– Read

via "Naked Security".
โš  Intel patches another security flaw in SGX technology โš 

Of the six advisories Intel released last week, the most interesting is a flaw discovered in the companyโ€™s Software Guard Extensions (SGX).

๐Ÿ“– Read

via "Naked Security".
โš  Are you sure those WhatsApp messages are meant for you? โš 

Abby Fuller got a shock when she logged into WhatsApp using a new telephone number. She found someone elseโ€™s messages waiting for her.

๐Ÿ“– Read

via "Naked Security".
โŒ VOIPO Database Exposes Millions of Texts, Call Logs โŒ

VOIPO acknowledged that a development server had been accidentally left publicly accessible, and took the server offline.

๐Ÿ“– Read

via "Threatpost | The first stop for security news".
โŒ Magecart Returns with Advertising Library Tactic โŒ

The threat group also has a new subsidiary, Magecart Group 12.

๐Ÿ“– Read

via "Threatpost | The first stop for security news".
๐Ÿ” Top 10 app vulnerabilities: Unpatched plugins and extensions dominate ๐Ÿ”

Despite the existence of patches, the proliferation of unpatched installations are enticing targets for malicious actors, according to a WhiteHat report.

๐Ÿ“– Read

via "Security on TechRepublic".
๐Ÿ•ด Triton/Trisis Attack Was More Widespread Than Publicly Known ๐Ÿ•ด

Signs of the attack first showed up two months before it was identified as a cyberattack, but they were mistaken for a pure equipment failure by Schneider Electric, security expert reveals at S4x19.

๐Ÿ“– Read

via "Dark Reading: ".
ATENTIONโ€ผ New - CVE-2016-9651 (chrome, enterprise_linux_desktop, enterprise_linux_server, enterprise_linux_workstation)

A missing check for whether a property of a JS object is private in V8 in Google Chrome prior to 55.0.2883.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.

๐Ÿ“– Read

via "National Vulnerability Database".
โŒ Fortnite Hacked Via Insecure Single Sign-On โŒ

Leaky Fortnite single sign-on mechanism could have allowed hackers to access game accounts.

๐Ÿ“– Read

via "Threatpost | The first stop for security news".
๐Ÿ•ด Are You Listening to Your Kill Chain? ๐Ÿ•ด

With the right tools and trained staff, any organization should be able to deal with threats before information is compromised.

๐Ÿ“– Read

via "Dark Reading: ".